咨询与建议

限定检索结果

文献类型

  • 832 篇 会议
  • 653 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,508 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 999 篇 工学
    • 783 篇 计算机科学与技术...
    • 664 篇 软件工程
    • 167 篇 信息与通信工程
    • 109 篇 控制科学与工程
    • 91 篇 生物工程
    • 83 篇 电气工程
    • 64 篇 电子科学与技术(可...
    • 64 篇 生物医学工程(可授...
    • 63 篇 机械工程
    • 60 篇 光学工程
    • 42 篇 化学工程与技术
    • 39 篇 网络空间安全
    • 35 篇 仪器科学与技术
    • 32 篇 安全科学与工程
    • 27 篇 交通运输工程
    • 23 篇 动力工程及工程热...
  • 448 篇 理学
    • 266 篇 数学
    • 108 篇 生物学
    • 101 篇 物理学
    • 76 篇 统计学(可授理学、...
    • 44 篇 系统科学
    • 42 篇 化学
  • 276 篇 管理学
    • 188 篇 管理科学与工程(可...
    • 109 篇 图书情报与档案管...
    • 59 篇 工商管理
  • 53 篇 医学
    • 49 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 35 篇 法学
    • 32 篇 社会学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 13 篇 农学
  • 12 篇 军事学
  • 11 篇 教育学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 39 篇 computer science
  • 33 篇 machine learning
  • 32 篇 computational mo...
  • 31 篇 semantics
  • 31 篇 training
  • 29 篇 software enginee...
  • 28 篇 data mining
  • 28 篇 feature extracti...
  • 26 篇 software
  • 25 篇 accuracy
  • 22 篇 deep learning
  • 21 篇 predictive model...
  • 19 篇 testing
  • 18 篇 convolution
  • 18 篇 authentication
  • 17 篇 cloud computing
  • 16 篇 analytical model...
  • 16 篇 artificial intel...
  • 14 篇 conferences
  • 14 篇 optimization

机构

  • 178 篇 state key labora...
  • 120 篇 university of ch...
  • 97 篇 institute of sof...
  • 53 篇 college of compu...
  • 44 篇 academy of compu...
  • 41 篇 technology cente...
  • 38 篇 jd explore acade...
  • 37 篇 school of comput...
  • 29 篇 academy of compu...
  • 26 篇 institute of inf...
  • 24 篇 institute of com...
  • 22 篇 shenzhen institu...
  • 20 篇 department of co...
  • 20 篇 state key labora...
  • 19 篇 school of electr...
  • 17 篇 school of comput...
  • 17 篇 school of comput...
  • 17 篇 school of comput...
  • 16 篇 college of infor...
  • 16 篇 graduate univers...

作者

  • 38 篇 tao dacheng
  • 34 篇 du bo
  • 18 篇 wu enhua
  • 17 篇 fan heng
  • 17 篇 jun yan
  • 17 篇 zhang libo
  • 17 篇 marijke coetzee
  • 16 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 bin sheng
  • 12 篇 tian feng
  • 11 篇 qing wang
  • 11 篇 dai guozhong

语言

  • 1,410 篇 英文
  • 54 篇 其他
  • 45 篇 中文
  • 1 篇 日文
检索条件"机构=Academy of Computer Science and Software Engineering"
1508 条 记 录,以下是141-150 订阅
排序:
Predicting stock price movement with social media and deep learning
Predicting stock price movement with social media and deep l...
收藏 引用
2020 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems, icABCD 2020
作者: Archary, Diren Coetzee, Marijke Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
Information from traditional media sources has played an important role in determining the movement of stock prices. However, in recent times, online social network platforms have promoted a more efficient way to shar... 详细信息
来源: 评论
Cheap latex, high-end thrills: A fantasy exercise in search and seizure  46th
Cheap latex, high-end thrills: A fantasy exercise in search ...
收藏 引用
46th Annual Conference of the Southern African computer Lecturers’ Association, SACLA 2017
作者: Leung, Wai Sze Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
Quite often computer Forensics students are afforded little or no opportunity to gain experience when it comes to retrieving digital evidence from a crime scene. For our offering, the exclusion was attributed to a lac... 详细信息
来源: 评论
Face Anti-spoofing based on Convolutional Neural Networks  3
Face Anti-spoofing based on Convolutional Neural Networks
收藏 引用
3rd International Conference on Intelligent Data science Technologies and Applications, IDSTA 2022
作者: Maphisa, Siyamdumisa Coulter, Duncan University of Johannesburg Academy of Computer Science and Software Engineering Johannesburg South Africa
Biometrics technologies have gained increasing attention across different sectors in the past decade. Face recognition has proven to be one of these successful biometric technologies. For example, law enforcement uses... 详细信息
来源: 评论
Adaptive Game AI-Based Dynamic Difficulty Scaling via the Symbiotic Game Agent  11th
Adaptive Game AI-Based Dynamic Difficulty Scaling via the Sy...
收藏 引用
11th IFIP TC 12 International Conference on Intelligent Information Processing, IIP 2020
作者: Sithungu, Siphesihle Philezwini Ehlers, Elizabeth Marie Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
This work presents AdaptiveSGA, a model for implementing Dynamic Difficulty Scaling through Adaptive Game AI via the Symbiotic Game Agent framework. The use of Dynamic Difficulty Balancing in modern computer games is ... 详细信息
来源: 评论
Real-Time Face Antispoofing Using Shearlets  1
收藏 引用
17th International Conference on Information Security, ISSA 2018
作者: van der Haar, Dustin Terence Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
Face recognition. A promise made to the modern technologists as the ultimate access control or surveillance technology. However, it is still vulnerable to inexpensive spoofing attacks, which pose a threat to security.... 详细信息
来源: 评论
SA-EF Cube: An Evaluation Framework for Assessing Intelligent Context-Aware Critical Information Infrastructure Protection Solutions  1
收藏 引用
17th International Conference on Information Security, ISSA 2018
作者: van Niekerk, Jan Hendrik Ehlers, Elizabeth Marie Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
Advances in technologies such as cloud computing and Bring Your Own Technology (BYOT) environments have dramatically changed the way in which organisations do business. Critical Information Infrastructure (CII) is at ... 详细信息
来源: 评论
Web services security policy assertion trade-offs
Web services security policy assertion trade-offs
收藏 引用
2011 6th International Conference on Availability, Reliability and Security, ARES 2011
作者: Lavarack, Tristan Coetzee, Marijke Academy of Computer Science and Software Engineering University of Johannesburg Gauteng South Africa
Web services security requirements and capabilities are described in security policies. To enable the seamless interoperation between services, security policy intersection aims to provide a security policy that will ... 详细信息
来源: 评论
Inflammation security: A decentralised immune model for resource distribution in networks
Inflammation security: A decentralised immune model for reso...
收藏 引用
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
作者: Heydenrych, Mark Ehlers, Elizabeth Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
This paper will present a method for disseminating mobile agents throughout a network in order to protect that network. This method is based on the immune concept of inflammation, which provides greater blood flow to ... 详细信息
来源: 评论
CESIMAS: A Self-adaptive MAS toward improved Critical Infrastructure protection
CESIMAS: A Self-adaptive MAS toward improved Critical Infras...
收藏 引用
作者: Van Niekerk, Jan Hendrik Ehlers, Elizabeth Marie Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
At the core of every organisation is a set of electronic assets that enables an organisation to perform its daily operations. This Critical Infrastructure (CI) forms the fundamental core of the organisation. CI is dyn... 详细信息
来源: 评论
An aviation sector CSIRT for Sub-Saharan Africa  1
收藏 引用
18th International Conference on Information Security, ISSA 2019
作者: Lekota, Faith Coetzee, Marijke Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
computer Security Incident Response Teams (CSIRTs) provide information security incident response services to communities. The South African Cybersecurity Hub (SACH) acts as a national point of contact for the coordin... 详细信息
来源: 评论